ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,179 results

FEHA
⚠️ TOOLS = NONSENSE ⚠️ | Open Source GRC - Future of Compliance or Just a Trend⁉️ | GITEX Asia, SG📍

Open-source platforms for GRC are trending — but is this just hype or the real deal? In this episode, let's dive into: Why some ...

9:50
⚠️ TOOLS = NONSENSE ⚠️ | Open Source GRC - Future of Compliance or Just a Trend⁉️ | GITEX Asia, SG📍

62 views

11 months ago

GhostStrats
Building a Budget-Friendly Private Cybersecurity Laptop Step by Step!

In this video, I take you on a trip to Walmart to find the perfect budget-friendly laptop for your cybersecurity and privacy needs.

7:59
Building a Budget-Friendly Private Cybersecurity Laptop Step by Step!

77,816 views

1 year ago

Pat's Cyber Chronicles
Linux isn’t as secure as you think

In this video I rant about why Linux isn't as secure as you think.

9:54
Linux isn’t as secure as you think

496 views

7 months ago

Cyvatar
Cybersecurity Revolution | Corey White at NMSDC 2024

In this insightful presentation at the 2024 NMSDC Annual Conference & Exchange, Corey White, Founder and CEO of Cyvatar, ...

21:16
Cybersecurity Revolution | Corey White at NMSDC 2024

36 views

1 year ago

Michael Valenzuela
The AI System That Went Viral & Broke the Internet. And Why It Matters to Your Business

An AI agent went viral in just 72 hours — and while the tech is impressive, I don't think most people should be installing this.

12:09
The AI System That Went Viral & Broke the Internet. And Why It Matters to Your Business

178 views

2 months ago

CS50
CS50 Cybersecurity - Lecture 3 - Securing Software

This is CS50, Harvard University's introduction to the intellectual enterprises of computer science and the art of programming.

1:57:27
CS50 Cybersecurity - Lecture 3 - Securing Software

110,227 views

2 years ago

Cyber SecGuru
Part 4 -Top 10 OSINT Tools You MUST Know in 2025

... Tools to Master Open Source Intelligence OSINT Tools & Techniques | Step-by-Step Guide Top OSINT Tools for Cybersecurity ...

57:30
Part 4 -Top 10 OSINT Tools You MUST Know in 2025

22 views

7 months ago

Noris Buriac
AI Security - How to get started

You got this.

4:29
AI Security - How to get started

75 views

4 months ago

CONSOLE Project
Plugpoint on security and robustness of the software development process.

Romania-based plugpoint.ro is another pilot for the CONSOLE project. Alexandru Dunca, co-founder, discussed with Ourania ...

4:37
Plugpoint on security and robustness of the software development process.

158 views

4 months ago

Grafana
eBPF in 1 minute

How would you describe eBPF in 1 minute? David Allen, Director of Developer Advocacy at Grafana Labs, talks about exactly ...

1:00
eBPF in 1 minute

3,782 views

2 years ago

cogsec
AgentShield: Autonomous Security Tool for the ECC Ecosystem (Anthropic x Cerebral Valley Submission)

If you're building with agents, your config is probably leaking data. I built AgentShield as the security layer for the ECC (Everything ...

3:01
AgentShield: Autonomous Security Tool for the ECC Ecosystem (Anthropic x Cerebral Valley Submission)

349 views

3 weeks ago

Ryhan Russia
Cyber Security with Kali Linux

It was a presentation Cyber Security with Kali Linux. Voronezh State University of Forestry and Technologies named after G.F. ...

8:33
Cyber Security with Kali Linux

1 view

9 days ago

GingerHacker
Linux + Beta is out now !!

Linux Beta Exam is Here! Are you ready to level up your skills? ✨ The Linux Beta Exam is now LIVE! Whether you're a ...

0:48
Linux + Beta is out now !!

65,060 views

1 year ago

CyberSecurity Learner
SAST - Static Application Security Testing

sast #application #cybersecurity #2024.

7:41
SAST - Static Application Security Testing

11 views

1 year ago

Luca Berton
OX Security Explained: Fix the 5% That Matters — Code-to-Cloud AppSec, DAST & Containers

Code → Cloud coverage: SAST, SCA/open source, CI/CD pipeline checks, container scanning, and cloud posture (CSPM).

2:49
OX Security Explained: Fix the 5% That Matters — Code-to-Cloud AppSec, DAST & Containers

43 views

6 months ago

Arpit Jain
Supply Chain security presentation at OpenSSF conference organized by the Linux Foundation at Tokyo
19:22
Supply Chain security presentation at OpenSSF conference organized by the Linux Foundation at Tokyo

7 views

9 months ago

James Gatt
Android is open source, what does that mean for us? | droidcon Berlin 2022 (Alternate Camera)

Were you aware that the average consumer opts to buy a new device every 2 years? Consequently, most Android device OEMs ...

21:57
Android is open source, what does that mean for us? | droidcon Berlin 2022 (Alternate Camera)

99 views

3 years ago

GhostStrats and JMFH!
Best DIY Hacking Gadget of 2026? Built with Amazon Parts | Hale Hound!

Today we're checking out HaleHound, one of the most interesting DIY cybersecurity gadget projects I've seen in 2026.

5:50
Best DIY Hacking Gadget of 2026? Built with Amazon Parts | Hale Hound!

5,256 views

4 days ago

securowave
What is Wazuh? Complete Explanation in Hind | Interview | Cyber Security Course Part 19

In this video, we explain Wazuh, a powerful open-source security monitoring and SIEM platform used by cybersecurity ...

5:35
What is Wazuh? Complete Explanation in Hind | Interview | Cyber Security Course Part 19

42 views

1 month ago

Kodlot - Data in Cloud Enablement
Data Platforms on AWS: Lessons Learned - Security and Governance

Part of the presentation on Copenhagen AWS User Group Meetup in June 2024: ...

7:33
Data Platforms on AWS: Lessons Learned - Security and Governance

24 views

1 year ago